CVE-2021-3478

There's a flaw in OpenEXR's scanline input file functionality in versions before 3.0.0-beta. An attacker able to submit a crafted file to be processed by OpenEXR could consume excessive system memory. The greatest impact of this flaw is to system availability.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
5.5 MEDIUM
LOCAL
LOW
NONE
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 28%
VendorProductVersion
openexropenexr
𝑥
< 2.4.3
openexropenexr
2.5.0 ≤
𝑥
< 2.5.4
debiandebian_linux
9.0
debiandebian_linux
10.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
openexr
bullseye (security)
2.5.4-2+deb11u1
fixed
bullseye
2.5.4-2+deb11u1
fixed
bookworm
3.1.5-5
fixed
sid
3.1.5-5.1
fixed
trixie
3.1.5-5.1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
openexr
jammy
not-affected
impish
not-affected
hirsute
not-affected
groovy
Fixed 2.5.3-2ubuntu0.2
released
focal
Fixed 2.3.0-6ubuntu0.5
released
bionic
Fixed 2.2.0-11.1ubuntu1.6
released
xenial
Fixed 2.2.0-10ubuntu2.6
released
trusty
dne